A screenshot of the drone monitoring application, showing spoofed drones and their coordinates

Can’t Disable DJI Drone ID? Spoof It With An ESP!

We have been alerted to a fun tool, a DJI DroneID spoofer software for ESP8266/ESP32 and some other popular MCUs. Last year, we’ve told you about DJI DroneID — a technology DJI added to their drones, which broadcasts data including the drone operator’s GPS position, which, in turn, appears to have resulted in Ukrainian casualties in the Ukraine war. The announcement tweet states that DJI has added mechanisms from downgrading firmware. Hence, the spoofer.

There’s no other hardware needed, well other than an ESP8266 or ESP32 devboard, anyway. After the break you can find a video tutorial from [Joshua Bardwell] that shows you how to upload the code using Arduino IDE, and even going through coordinate tweaks. If you ever reminisced about the concept of throwies and were wondering what kind of useful, well, there’s your answer: clone the Git repo, compile it, program some interesting coordinates in, and witness the imaginary drones fly.

All in all, we get a lovely addition to our shenanigan toolkits. Surely, someone could use a neural network to distinguish real drones from fake ones, but it’s nothing that can’t be solved with a bit of code. Looking for a less daring hack? Well, you can always add some automation to your DJI drone by poking at the RGB LED signals.

Continue reading “Can’t Disable DJI Drone ID? Spoof It With An ESP!”

THOR Microwaves Drone Swarms

In recent years small drones have gone from being toys and photography tools to a deadly threat on the battlefield. Kamikaze drones have become especially prominent in the news due to their use in the war in Ukraine by both sides. While we haven’t seen coordinated swarms being actively employed on the modern battlefield, it’s likely only a matter of time, making drone swarm defense an active field of development in the industry.

The US Air Force Research Laboratory recently conducted tests and a demonstration of an anti-drone weapon that uses pulses of high-power microwave energy to fry the electronics of a swarm of drones. Named the Tactical High-power Operational Responder, or THOR  (presumably they picked the acronym first), it’s housed in a 20ft shipping container with large microwave antenna on top. The form factor is important because a weapon is only useful if it can reach the battlefield, and this can fit in the back of a C130.

THOR likely functions similarly to a shotgun, with a relatively large effective “beam.” This would have added advantages like frying multiple drones with one pulse and not needing pinpoint tracking and aiming tech required for projectile and laser-based weapons. Depending on its range and directivity, THOR might come with the downside of collateral damage to electronics close to its line of fire.

Drone swarms are of course the other side of this arms race, but fortunately they also have non-destructive uses like lights shows and perhaps even 3D printing.

Screenshot of the SDR software in action, with decoded data in a terminal, and a map that shows the location received from the decoded data

Loudmouth DJI Drones Tell Everyone Where You Are

Back when commercial quadcopters started appearing in the news on the regular, public safety was a talking point. How, for example, do we keep them away from airports? Well, large drone companies didn’t want the negative PR, so some voluntarily added geofencing and tracking mechanisms to their own drones.

When it comes to DJI, one such mechanism is DroneID: a beacon on the drone itself, sending out a trove of data, including its operator’s GPS location. DJI also, of course, sells the Aeroscope device that receives and decodes DroneID data, declared to be for government use. As it often is with privacy-compromising technology, turns out it’s been a bigger compromise than we expected.

Questions started popping up last year, as off-the-shelf quadcopters (including those made by DJI) started to play a part in the Russo-Ukrainian War. It didn’t take long for Ukrainian forces to notice that launching a DJI drone led to its operators being swiftly attacked, and intel was that Russia got some Aeroscopes from Syria. DJI’s response was that their products were not meant to be used this way, and shortly thereafter cut sales to both Russia and Ukraine.

But security researchers have recently discovered the situation was actually worse than we expected. Back in 2022, DJI claimed that the DroneID data was encrypted, but [Kevin Finisterre]’s research proved that to be a lie — with the company finally admitting to it after Verge pushed them on the question. It wouldn’t even be hard to implement a worse-than-nothing encryption that holds up mathematically. However, it seems, DroneID doesn’t even try: here’s a GitHub repository with a DroneID decoder you can use if you have an SDR dongle.

Sadly, the days of companies like DJI standing up against the anti-copter talking points seem to be over, Now they’re setting an example on how devices can subvert their owners’ privacy without reservation. Looks like it’s up to hackers on the frontlines to learn how to excise DroneID, just like we’ve done with the un-nuanced RF power limitations, or the DJI battery DRM, or transplanting firmware between hardware-identical DJI flight controller models.

Continue reading “Loudmouth DJI Drones Tell Everyone Where You Are”

Modular Anti-Drone Drone Sacrifices Itself For Self Defense

Part Racing Drone, Part RC Airplane, Part Rocket…all Menace. How else could you describe a quadcopter that shoots off at high speed and is designed for taking down other small quadcopters? The Interceptor Drone by [Aleksey] borrows elements from all of the aforementioned disciplines of flying things.

Built with standard racing drone parts, [Aleksey] assures that no prohibited parts are used in its construction. Instead, the Interceptor Drone relies on a very powerful motors and a light weight frame to keep the power to weight ratio in the “rocketing into the sky” category.

A close up shows the details: Detachable motors and rotors and the stowed net.

But what Interceptor Drone would be complete without a way to take its target out of the sky? This is where the biggest divergences begin. The motors are all oriented to point away from the center-line of the craft. Upon command, these motors actually detach from the frame, each spreading out and deploying the corner of a net that’s designed to entangle the rotors of the target, causing its battle with gravity to come to a grinding halt.

How does the Interceptor Drone survive the attack? Without its motors, the core of the quadcopter falls to the earth. Arresting the fall is a parachute much like those used in model rocketry. An audio beacon sounds the alarm to help somebody to find it — a move taken straight from the RC aircraft hobby.

There’s certainly a lot of room to discuss legalities in localities, but regardless of opinion about the craft’s intended use, the system looks very slick, and there are some great hacks baked right in. Don’t want to build a drone-killing-drone? Maybe all you need is a pumpkin and good (bad?) timing.

Continue reading “Modular Anti-Drone Drone Sacrifices Itself For Self Defense”

Drone On Drone Warfare, With Jammers

After the alleged drone attacks on London Gatwick airport in 2018 we’ve been on the look out for effective countermeasures against these rogue drone operators. An interesting solution has been created by [Ogün Levent] in Turkey and is briefly documented on in his Dronesense page on Crowdsupply. There’s a few gaps in the write up due to non-disclosure agreements, but we might well be able to make some good guesses as to the missing content.

Not one, but two LimeSDRs are sent off into the air onboard a custom made drone to track down other drones and knock them out by jamming their signals, which is generally much safer than trying to fire air to air guided missiles at them!

The drone hardware used by [Ogün Levent] and his team is a custom-made S600 frame with T-Motor U3 motors and a 40 A speed controller, with a takeoff weight of 5 kg. An Adventech single board computer is the master controller with a Pixhawk secondary and, most importantly, a honking great big 4 W, 2.4 GHz frequency jammer with a range of 1200 meters.

The big advantage of sending out a hunter drone with countermeasures rather than trying to do it on the ground is that, being closer to the drone, the power of the jammer can be reduced, thus creating less disturbance to other RF devices in the area – the rogue drone is specifically targeted.

One of the LimeSDRs runs a GNU radio flowgraph with a specially designed block for detecting the rogue drone’s frequency modulation signature with what seems to be a machine learning classification script. The other LimeSDR runs another *secret* flowgraph and a custom script running on the SBC combines the two flowgraphs together.

So now it’s the fun part, what does the second LimeSDR do? Some of the more obvious problems with the overall concept is that the drone will jam itself and the rogue drone might already have anti-jamming capabilities installed, in which case it will just return to home. Maybe the second SDR is there to track the drone as it returns home and thereby catch the human operator? Answers/suggestions in the comments below! Video after the break. Continue reading “Drone On Drone Warfare, With Jammers”

Drone License Plates: An Idea That Won’t Stave Off The Inevitable

As more and more drones hit the skies, we are beginning to encounter a modest number of problems that promise to balloon if ignored. 825,000 drones above a quarter-kilo in weight were sold in the U.S. in 2016. The question has become, how do we control all these drones?

Continue reading “Drone License Plates: An Idea That Won’t Stave Off The Inevitable”

Radio Jamming Rifle Claimed To Disable Drones

[Battelle], an Ohio-based non-profit R&D firm has just unveiled a device they call the DroneDefender — a long-range anti-drone defense weapon. It almost sounds like they’ve brought the fictional drone hunter’s RF cannon to life. But does it really work?

According to the site, it uses radio frequency disruption to blast unwanted drones out of the sky. Cool concept, but does it actually work? Unlike the hackable MAVLink protocol used by Parrot AR, ArduPilot and a handful of other consumer drones, this weapon uses brute radio signal force to disable any(?) consumer drone.

There’s a video after the break demonstrating a simulated use of the technology, which leaves us a bit confused. They show the drone slowly landing all nicely after being “guided” down by the rifle. If the system is jamming both GPS and the 2.4 GHz control link, the behavior will all depend on the software loaded on the drone. Some will go to a fail-safe mode, which is low throttle or motor power off, assuming the pilot has set fail-safe. Others may attempt to loiter on IMU sensors only.

Continue reading “Radio Jamming Rifle Claimed To Disable Drones”